Skip to main content
. Author manuscript; available in PMC: 2014 Jan 29.
Published in final edited form as: IEEE Trans Dependable Secure Comput. 2012 Jan 17;9(3):332–344. doi: 10.1109/TDSC.2012.11

Fig. 13.

Fig. 13

Comparison of the detection models at several mix rates. The number of accessed subjects for simulated user is random.